Topology Control and Routing over Wireless Optical Backbone Networks*
|
|
- Ilene Phelps
- 5 years ago
- Views:
Transcription
1 Topology Control and Routing over Wireless Optical Backbone Networks* Abhishek Kashyap, Samir Khuller and Mark Shayman Institute for Systems Research Department of Electrical and Computer Engineering University of Maryland, College Park {kashyap, Department of Computer Science University of Maryland, College Park Abstract The problem of topology control and routing over wireless optical backbone networks is addressed. The input to the problem is a potential topology and a traffic profile. The constraints are that of limited interfaces at each node and the limited bandwidth of the links, and the objective is of maximizing the throughput. The problem turns out to be NP-Hard, and we propose some heuristics based on graph modelling and multicommodity flow algorithms to solve the problem. We also enhance the heuristics to try and provide fairness to the ingress-egress pairs in terms of how much traffic we route for each of them. I. INTRODUCTION We consider the problem of topology control in wireless optical backbone networks, taking the estimated traffic into consideration. Our aim is to maximize the throughput over the topology for a given estimate of the traffic. We prove the problem to be NP-Hard, and then propose heuristics to achieve the goal. We also propose a scheme to provide fairness to the traffic routed between different ingress-egress pairs. We consider wireless optical links because of their attractive characteristics which make them more suitable for backbone networks (compared to using RF and wireline optical links). Free-space optics technology is expected to deliver unprecedented bandwidth, massive carrier reuse, ultralow inter-channel interference, low power consumption, and cost savings where electrical wires and optical fibers are too expensive to deploy and maintain [1]. A key distinguishing feature of wireless optical networks is that the links are pointto-point rather than broadcast. Also, it has wide applicability from long range satellite to indoor wireless communications. The problem of topology control for wireless optical networks is different from that in wireless RF (radio frequency) networks since the links are point-to-point as opposed to broadcast. In wireless optical networks, each node has a limited number of transceivers, and hence can establish links with only a limited number of nodes within its transmission range. Thus, topology control is concerned with determining the neighbors with which to establish the limited number of *This research was partially supported by AFOSR under grant F possible links. In wireless networks, most research for topology control so far has focused on RF networks (see e.g., [10], [11], [16], [17], [18], [19], [20]). In RF-wireless networks with isotropic antennas, topology control is closely related to power control. Power is controlled to reduce the transmission range to conserve power and decrease interference while providing adequate connectivity. There are important differences between topology control for reconfigurable wireline optical networks and topology control for wireless optical networks. In the wireline case, transmission range (lightpath length) is not a major issue. Furthermore, if the optical layer has sufficient resources so the routing and wavelength assignment problem is always solvable, then whenever a source and destination both have available interfaces, a direct connection (one logical hop) can be established. In contrast, in the wireless case, unless the destination is within the transmission range of the source, a multihop connection is required. For these reasons, the many published results on logical topology design for wireline optical networks, [12], [13], [14], [15], are not directly applicable to free-space optical networks. There has been recent work on topology control in wireless optical networks ([4], [5]): [5] does not take traffic into consideration, while [4] considers only ring topologies. The work presented in [6] proposes a framework and some heuristics for topology control and routing which take potential traffic into consideration, and we compare our algorithms with those heuristics. The algorithms presented in this paper have a lower time complexity than the algorithms proposed in [6]. We also extend the algorithms proposed in [6] to allow for splitting the traffic as a commodity using multi-commodity flow formulation. The heuristics we propose take as input a potential topology and the estimated aggregate traffic between the ingress-egress pairs (which we call the traffic profile). Each node is assumed to have a constraint on the number of interfaces it can have, and hence on the number of actual links that can be created from among the potential links. The decision of selecting the links to be formed is made on the basis of evaluating the total bandwidth guarantees (which we call throughput) we
2 can give for the given traffic profile. The traffic profile can be measured over some previous operation of the network or can be had from service level agreements (SLAs). We use matching theory, [9] along with the formulation of routing as a multi-commodity flow problem to calculate the topology and bandwidth reservations for the ingress-egress pairs. The bandwidth reservations calculated can be used for routing and admission control when the network is formed. The advantages of computing the bandwidth reservations offline and using that information for routing and exercising admission control can be found in [3]. The paper is organized as follows: Section 2 describes the network model and gives the problem statement. Section 3 explains the policies we compare the algorithms with. Section 4 explains our algorithm. Section 5 gives the extension to achieve fairness. Section 6 discusses the computational complexity and presents the simulation results. II. NETWORK MODEL AND PROBLEM DEFINITION We model the network as a graph G = (V,E), where V is the set of nodes and E is the set of potential links between them. We consider wireless backbone networks in which each wireless node is equipped with point-to-point wireless optical interfaces. By the term node we implicitly mean backbone node. Each node has the capability to perform routing. We assume that it does not move very frequently. We also assume that wireless links can be set up in any direction with all the nodes within the transmission range. We do not consider the possibility of optical beam obscuration, but this assumption is not essential. Since the transmission distance is related to the power level of the node, the power level and thus the transmission range of each node can be different. The wireless links are unidirectional. If there is a pair of unidirectional links between two nodes, the link capacities may differ. The number of transmitters and receivers at each node is limited (which we call an interface constraint), thereby restricting the number of nodes to which it can connect. We have a traffic profile, which consists of the aggregate traffic demands between the sources and destinations. The traffic demand from node x to node y can be different from the traffic demand from node y to node x. The problem we address is to form a subgraph G = (V,E ), such that the interface constraints are satisfied for all nodes in the set V (i.e., the degree of each node is bounded by the number of available interfaces), and we maximize the throughput considering the traffic profile. The algorithm forms this subgraph, which we call topology control, and comes up with routes and bandwidth reservations for the ingressegress pairs given in the traffic profile. The server should recompute the topology, routes and bandwidth reservations whenever either the traffic profile or the (backbone) node locations change significantly. We do not anticipate that this would be done more often than hourly. The nodes then use this information to perform routing and traffic engineering on incoming flows. We provide a proof that the problem of topology control is NP-Hard: Consider a small amount of traffic between each pair of nodes in the network (small enough not to violate any capacity constraints). The problem of maximizing the throughput reduces to finding a connected subgraph here. We can remove the extra edges and the problem reduces to finding a degree-constrained spanning tree, which is a known NP-Hard problem. A special case is where we have a degree constraint of 1 incoming and 1 outgoing edge on each node. In this case, the problem reduces to finding a hamiltonian cycle, which is known to be NP-Complete [7]. A. Routing as Multi-commodity flow problem We set up the problem of routing a given traffic profile over a computed topology for maximizing the throughput as a linear multi-commodity flow problem [3]. Let there be M commodities (profile entries, the value of each entry is prof ile(i)), N nodes and L links in the network. We add a dummy link (infinite cost, infinite capacity) between the source and destination of each commodity to achieve feasibility (thus, there are M such links). Let x i (l) be the amount of commodity i routed through link l. Let cost(l) represent the cost of each link, which is 1 for an actual link for our objective of maximizing the throughput. Let the set of incoming and outgoing links at node j be denoted by in j and out j respectively. Let source i and dest i represent the source and destination of profile i. Equation 1 achieves the objective of maximizing the throughput as the algorithm tries to route on the actual links due to large cost of the dummy links. Equation 2 represents the bandwidth constraints. Equations 3 and 4 represent the flow conservation laws. minimize L+M l=1 (cost(l) M x i (l)) (1) i=1 M x i (l) capacity(l) l {1,..,L} (2) i=1 l in j x i (l) = l out j x i (l) j {1,..,N} {source i,dest i }, i {1,..,M} (3) l out j x i (l) l in j x i (l) = profile(i), j = source i, i {1,..,M} (4) III. ROLLOUT ALGORITHMS We present a brief description of some rollout algorithms and their heuristic proposed in [6]. The heuristic takes a traffic profile and sorts it in decreasing order of demands. For each entry of the profile in that order, it finds a single constrained shortest path between the source and the destination, forms that path (finalizes the links of that path) in the topology (if
3 one exists which can accommodate all the demand of this entry), deletes the links violating the interface constraints in this partial topology, and updates the capacity of the links of this shortest path by decreasing by the value of this profile entry. A. Route Rollout This technique is an improvement over the heuristic, and is guaranteed to work at least as good as the heuristic in terms of the objective function (throughput). It starts with a sorted traffic profile (in decreasing order). At stage i, it finds K constrained shortest paths for profile entry i, and starting with each of those paths (i.e., temporarily finalizing the links in that path), it forms the complete topology using the heuristic. The path which gives the maximum throughput (total demand routed) is chosen (i.e., links finalized, potential links violating interface constraints deleted and residual bandwidths updated to reflect the demand routed), and the algorithm advances to the next stage. B. Index Rollout This technique decides the order in which the profile entries should be routed to get maximum throughput. At each stage, it uses the heuristic to form the complete topology starting from each of the unrouted profile entries (and sorting the remaining unrouted entries in decreasing order), and calculates the throughput in each case. It selects the profile entry which gives the maximum throughput, and finalizes the links for its shortest path, along with updating the residual bandwidths and deleting links violating the interface constraints. C. Integrated Rollout This rollout takes into consideration both the index and the routes. Unlike index rollout, at each stage, it finds K constrained shortest paths for each of the unrouted entries, and for each case, it uses the heuristic to route the rest of the unrouted profile entries. The profile entry (and the corresponding path) giving the maximum throughput is chosen and those links finalized, and the algorithm advances to next stage. In all the above cases, we are routing the whole profile entry over a single path (and not routing it at all if we are not able to route it all over one path). As an improvement, we can split the traffic linearly by applying the multi-commodity flow algorithm over the topology computed by these (as explained in Section 2) and get a better throughput. IV. APPLICATION OF MATCHING THEORY Here we present a new algorithm to form the topology and route the traffic profiles. The algorithm is outlined below and explained in the following subsections. 1) Weight the links in the initial graph to favor the links which are expected to have a higher traffic flow. 2) Map the network to one which can be given as an input to a maximum weight matching problem, [9] and solve the matching problem to get a maximum weight subgraph which satisfies the interface constraints. 3) Solve the multi-commodity flow problem over this topology. 4) Modify the topology sequentially and solve the multicommodity flow problem again each time, and finally, keep the topology which gives the maximum throughput. A. Giving Initial Weight to Edges The way we map the problem to maximum weight matching problem, if we give the same weight to all the links in the network, the output topology will have the maximum number of links while satisfying the degree constraints (as we try to maximize the weight during maximum weight matching, so same weight to all edges would result in maximizing the number of edges). We call the algorithm using this policy as Uniform Weighted Matching (UWM). As our objective is maximizing the throughput, so it is better to give extra weight to edges which are expected to carry more traffic. We call the algorithm using this policy as Traffic Weighted Matching (TWM), and explain it below. Give a weight of 1 to all edges. Find K shortest paths (maximum) of same length for each traffic profile (over the potential topology). Each time a link comes in a path, add to its weight prof ile(i)/numbersp, where prof ile(i) is the value of the profile entry, and numbersp the number of shortest paths we found for that profile entry. Another possibility is to give weights according to the number of paths a link comes on irrespective of the amount of traffic. In this case, we add 1 to the weight of a link in step 3 above. We called the algorithm using this strategy as Flow Weighted Matching. We work with shortest paths as the multi-commodity flow formulation will prefer shorter paths for a commodity because it minimizes the cost function of Equation 1 (to maximize the throughput). B. Mapping to Maximum Weight Matching Given a graph G = (V,E) (which corresponds to the potential network) with edge weights as explained in subsection A, we form a graph G = (V,E ) and give it as an input to the maximum weight matching problem. Let the number of transmit and receive interfaces (i.e., input and output degree constraints) at each vertex be. Figure 1 shows an example potential topology with = 2. The steps of mapping are explained below. For each vertex, we form 2 vertices in graph G ( of them correspond to the transmit interfaces, and to receive interfaces). For each edge between two vertices in G, we form two vertices in G, and add an edge between them (of weight 0), as well as between one of them and the transmit interface vertices (all of them) of the vertex it was going out of (with weight equal to the weight of the corresponding edge in G). Also add edges between the other vertex (in G ) of this edge (from G) and the receive interface vertices of the vertex it was incident on (with weight equal to the weight of the corresponding edge
4 Fig. 5. Connection between vertices undecidable Fig. 1. Potential Topology, = 2 Fig. 6. Result of Matching Algorithm Fig. 2. Modified graph from potential topology in G). The resulting graph for our example is shown in Figure 2 (the edges shown without weights have a weight of 1 here). T, R and E refer to the vertices corresponding to transmit interfaces, receive interfaces and edges in G respectively. Add a clique with 2 N vertices to the graph G, with each edge in the clique having a weight 0. Add 0 weight edges between each of these vertices and each of the vertices in G which correspond to the transmit and receive interfaces of the vertices in graph G. Sum the weight of all the edges in G and add that to the weight of all edges in G. We do this to make sure we get a perfect matching using a maximum weight matching algorithm. We solve the maximum weight matching problem on G, and deduce the resulting topology based on the result we get. We show the rules for mapping from the output of matching to the graph representing the topology: Figure 3 shows the scenario (a subgraph from the output of matching algorithm) when two vertices will have an edge between them in the final topology. Figure 4 shows the case when two vertices which had an edge between them in G will not have the edge in the resulting topology (as they are not connected to the edge vertices corresponding to the edge between them). We detect such subgraphs in the output graph from matching algorithm (the output graph will be composed of such subgraphs only), and use these rules to deduce the resulting topology. We added a clique to the graph G to avoid the scenario in which we cannot deduce the topology from the result of the matching algorithm. Figure 5 shows the case when this has happened between two vertices. In this case, one of the vertices connects to the edge vertex in G, while the other vertex does not connect with the corresponding edge vertex. This can be avoided by having perfect matching, and for achieving that we add a clique of size 2 N and connect each of them to all the vertices in G which correspond to transmit and receive interfaces of vertices in G. We accommodate the worst case in which all the vertices will be disconnected in the final topology. Figure 6 shows the output (minus the clique vertices and corresponding edges) of the matching algorithm and Figure 7 shows the final topology we get for the example network of Figure 1. C. Topology Change Strategy We solve the multi-commodity flow problem (as explained in Section 2) on the topology we get from the algorithm explained in Section 4.B. We sequentially change this topology and solve the multi-commodity flow problem on the resulting topologies to get an improvement in the throughput. The algorithm for changing the topology is as explained below: Fig. 3. Vertices are connected Fig. 4. Vertices are not connected Fig. 7. Final Topology
5 Make a list of the profile entries for which we could route less than x% of the demand in decreasing order of demand. For the first entry in this list, find (maximum) K shortest paths each in the potential topology and the current topology. Form the first path which is present in the potential topology, but not in the current topology by deleting the least loaded links (with traffic as given by the result of multi-commodity flow problem) at each of the interface-starved nodes in the current topology on this path. If all the paths are the same then repeat this step for the next entry in the list. Solve the multi-commodity flow problem for this changed topology. If the throughput is more than the throughput in the current topology then change the current topology to this topology and update the list by deleting the entries for which we have routed more than x% on this topology. If the throughput is less than before, then let the current topology remain the same and start with step 2 for the next entry in the list. We finally keep the topology we have at the end of this procedure. V. INCORPORATING FAIRNESS In all the algorithms we have seen so far, we do not consider fairness i.e., trying to route at least a certain fraction of each profile entry while maximizing the throughput. We address this problem by making changes to the multi-commodity flow formulation. We use two different weighting strategies for comparison: Fairness1: Use Traffic Weighted Matching. Fairness2: Use Flow Weighted Matching. This strategy is expected to be more fair than Fairness1. A. Multi-commodity Flow Formulation The primary change from the formulation explained before is the addition of the fairness constraint of Equation 5. Here, we sum the outgoing and incoming flows only over the actual links (and not over the (infinite capacity, infinite cost) links we added between the source and destination, as the traffic flowing over them is what we could not route). We also change the flow conservation law at intermediate nodes (of Equation 3) to include only the actual links adjacent to those nodes (Equation 6). Here, ain j denotes the actual incoming links at node j, and aout j denotes the actual outgoing links at j. This is done to make sure the traffic for a profile entry is not routed through the extra links between some nodes other than the source and destination of this profile entry (otherwise that will happen as the algorithm tries to force the condition of Equation 5). l aout j x i (l) l ain j x i (l) y profile(i), j = source i, i {1,..,M} (5) l ain j x i (l) = l aout j x i (l), j {1,..,N} {source i,dest i }, i {1,..,M} (6) This formulation will give an infeasible result if it is not able to route at least fraction y of each profile entry. We follow the following procedure to get the routes (and reservations) for the topology we get from the matching algorithm: Start at y = 0.95 and solve the changed multi-commodity flow problem. If it returns a feasible result, keep the current topology and these routes (and reservations) and exit. Else, decrease y by 0.05, and solve the problem again. If we get the answer at y = 0, then the answer is the same as what we get at the first step of the algorithm explained in Section 4. VI. SIMULATION AND COMPUTATIONAL ANALYSIS A. Computational Complexity The proposed algorithms take O(N 4 logn) time, with N being the number of nodes in the network. This complexity is much lower than that for route rollout (O(N 6 )) and index and integrated rollout algorithms (O(N 8 )). The heuristic used by these rollout algorithms takes O(N 4 ) time. B. Simulation Results The network used for simulations was assumed to have the following parameters: Number of nodes in the network = 20. This represents a reasonably sized backbone network. Nodes are uniformly distributed, with each node having an average of 6.5 potential neighbors. The transmission range of all nodes is assumed to be the same. Capacity of each link = 100 in each direction. Number of source-destination pairs = 160, chosen randomly. Aggregate traffic between each pair: Uniformly distributed between 1 and 40 units. Number of receive interfaces at each node = 3. Number of transmit interfaces at each node = 3. Threshold, x, for including a profile in the sequential topology change list = 20%. Number of shortest paths considered in Route Rollout and Integrated Rollout = 4. Number of shortest paths considered for initial weighting and sequential topology change, K = 3. Weight of each link for constrained shortest path computation = 1, thus making the shortest path as the constrained min-hop path. The simulation was run on a different random network and random profile 10 times and in each simulation, the network topology was formed starting with these parameters. The simulations were run for the heuristic and rollout algorithms described in [6], both with and without following it with
6 TABLE I AVERAGE THROUGHPUT FOR ROLLOUT ALGORITHMS TABLE V AVERAGE MINIMUM ROUTED FOR FAIRNESS SCHEMES Heuristic Route Rollout Index Rollout Integrated Rollout Fairness1 Fairness TABLE II AVERAGE THROUGHPUT FOR ROLLOUT ALGORITHMS WITH TRAFFIC SPLITTING Heuristic Route Rollout Index Rollout Integrated Rollout solving multi-commodity flow problem for routing. Tables I and II show the average fractional throughput for the rollout algorithms and their heuristic for the case where we do not split the traffic and the case where we split the traffic as a commodity respectively. As can be seen, splitting the traffic increases the throughput considerably. Table III shows the average throughput for the proposed algorithms. The matching algorithm used was an implementation of H. Gabow s N-cubed weighted matching algorithm [21]. As we can see, the algorithm with Traffic Weighted Matching (TWM) works the best, followed by Flow Weighted Matching (FWM), Uniform Weighted Matching (UWM) and the fairness schemes. Traffic Weighted Matching works 8.88% better than the heuristic for rollout and 2.25% better than the integrated rollout (with the proposed traffic splitting strategy). Table IV shows the average throughput we get in the proposed algorithms without using the sequential topology change strategy. As can be seen by comparing Tables III and IV, the improvement in throughput is the maximum in Uniform Weighted Matching followed by Flow Weighted Matching and Traffic Weighted Matching. This, along with the results of Table III, shows that Traffic Weighted Matching works the best among these three strategies. The metric we use to evaluate fairness is the minimum of the fraction of the demand routed for each profile entry. Table V shows the average of this parameter over the simulations. Fairness2 is more fair (0.53) than Fairness1 (0.425) as expected, though at the cost of throughput, as can be seen from Table III. TABLE III AVERAGE THROUGHPUT FOR MATCHING HEURISTICS UWM FWM TWM Fairness1 Fairness TABLE IV AVERAGE THROUGHPUT FOR MATCHING HEURISTICS WITHOUT SEQUENTIAL TOPOLOGY CHANGE UWM FWM TWM This metric turns out to be 0 for all other algorithms mentioned in this paper. REFERENCES [1] N. A. Riza, Reconfigurable Optical Wireless, LEOS 99 IEEE, vol.1, pp.70-71, 8-11 Nov [2] Z. Yaqoob, N. A. Riza, Smart Free-Space Optical Interconnects and Communication Links using Agile WDM Transmitters, 2001 Digest of the LEOS Summer Topical Meetings, 30 July-1 Aug [3] S. Suri, M. Waldvogel, D. Bauer, P. R. Warkhede, Profile-Based Routing and Traffic Engineering, Computer Communications, vol. 24(4), pp , March [4] A. Desai, Dynamic Topology Control of Free Space Optical Networks, M.S. Thesis, Department of Electrical Engineering, University of Maryland, [5] P. C. Gurumohan, J. Hui, Topology Design for Free Space Optical Networks, ICCCN [6] Abhishek Kashyap, Kwangil Lee, Mark Shayman, Rollout Algorithms for Integrated Topology Control and Routing in Wireless Optical Backbone Networks, Technical Report, Institute for Systems Research, University of Maryland, [7] M. Garey and D. Johnson, Computers and Intractability: A Guide to the theory of NP-Completeness, Freeman and Company, [8] D. P. Bertsekas, Dynamic Programming and Optimal Control, vol. 1, Athena Scientific, [9] L. Lovász and M. D. Plummer, Matching Theory, North-Holland, [10] R. Ramanathan and R. Rosales-Hain, Topology Control of Multihop Wireless Networks using Transmit Power Adjustment, IEEE Infocom 2000, vol. 2, pp , March [11] Z. Huang, C-C. Shen, C. Srisathapornphat and C. Jaikaeo, Topology Control for Ad Hoc Networks with Directional Antennas, ICCCN 2002, pp , Miami, Florida, October [12] D. Banerjee, B. Mukherjee, Wavelength-routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs and a Reconfiguration Study, IEEE/ACM Trans. Networking, vol. 8, pp , Oct [13] K. H. Liu, C. Liu, J. L. Pastor, A. Roy, J. Y. Wei, Performance and Testbed Study of Topology Reconfiguration in IP over WDM, IEEE Transactions on Communications, in press, [14] E. Leonardi, M. Mellia, M. A. Marsan, Algorithms for the Logical Topology Design in WDM All-Optical Networks, Optical Networks Magazine, pp , Jan [15] R. Ramaswami, K. N. Sivarajan, Design of Logical Topologies for Wavelength-Routed optical Networks, IEEE JSAC, pp , Jun [16] L. Li, J. Halpern, P. Bahl, Y-M. Wang and R. Wattenhofer, Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks, ACM Symposium on Principles of Distributed Computing, [17] V. Rodoplu and T. Meng, Minimum Energy Mobile Wireless Networks, IEEE International Conference on Communication, vol. 3, pp , 7-11 June [18] R. Wattenhofer, L. Li, P. Bahl and Y-M. Wang, Distributed Topology Control for Wireless Ad-hoc Networks, IEEE Infocom 2001, pp [19] S. Ruhrup, C. Schindelhauer, K. Volbert and M. Grunewald, Performance of Distributed Algorithms for Topology Control in Wireless Networks, International Parallel and Distributed Processing Symposium, [20] L. Bao and J. J. Garcia-Luna-Aceves, Topology Management in Ad Hoc Networks, ACM Mobihoc, pp , Annapolis, Maryland, June [21] H. Gabow, Implementation of Algorithms for Maximum Matching on Nonbipartite Graphs, Ph.D. thesis, Stanford University, 1973.
Rollout Algorithms for Integrated Topology Control and Routing in Wireless Optical Backbone Networks. by Abhishek Kashyap, Kwangil Lee, Mark Shayman
TECHNICAL RESEARCH REPORT Rollout Algorithms for Integrated Topology Control and Routing in Wireless Optical Backbone Networks by Abhishek Kashyap, Kwangil Lee, Mark Shayman TR 2003-51 I R INSTITUTE FOR
More informationRouting and Traffic Engineering in Hybrid RF/FSO Networks*
Routing and Traffic Engineering in Hybrid RF/FSO Networks* Abhishek Kashyap and Mark Shayman Department of Electrical and Computer Engineering, University of Maryland, College Park MD 20742 Email: {kashyap,
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationRollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks
Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Kwangil Lee Department of Electrical and Computer Engineering University of Texas, El Paso, TX 79928, USA. Email:
More informationI R TECHNICAL RESEARCH REPORT. A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks
TECHNICAL RESEARCH REPORT A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks by Kwang-Il Lee, Mark Shayman TR 2003-3 I R INSTITUTE FOR SYSTEMS RESEARCH
More informationMaximization of Single Hop Traffic with Greedy Heuristics
Maximization of Single Hop Traffic with Greedy Heuristics Esa Hyytiä Networking Laboratory, HUT, Finland, email: esa@netlab.hut.fi, ABSTRACT Maximization of the single hop traffic has been proposed as
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationA Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks
Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks
More informationAn Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks
An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,
More informationWavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks
Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationAn Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks
An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh,
More informationDistributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks
Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationFault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks
Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University
More informationA Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 285 A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks Hongyue Zhu, Student Member, IEEE, Hui Zang, Member,
More informationA Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing
A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,
More informationOn the Complexity of Broadcast Scheduling. Problem
On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)
More informationA New Architecture for Multihop Optical Networks
A New Architecture for Multihop Optical Networks A. Jaekel 1, S. Bandyopadhyay 1 and A. Sengupta 2 1 School of Computer Science, University of Windsor Windsor, Ontario N9B 3P4 2 Dept. of Computer Science,
More informationDistributed Clustering Method for Large-Scaled Wavelength Routed Networks
Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan
More informationEXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi
More informationDesign and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks
Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee
More informationOn-Line Routing in WDM-TDM Switched Optical Mesh Networks
On-Line Routing in WDM-TDM Switched Optical Mesh Networks Arun Vishwanath and Weifa Liang Department of Computer Science The Australian National University Canberra, ACT-0200, Australia Email: {arunv,wliang}@cs.anu.edu.au
More informationON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM
ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM SERGIY I. BUTENKO, CLAYTON W. COMMANDER, AND PANOS M. PARDALOS Abstract. In this paper, a Broadcast Scheduling Problem (bsp) in a time division multiple
More informationA NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS
A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS Nizar Bouabdallah^'^, Emannuel Dotaro^ and Guy Pujolle^ ^Alcatel Research & Innovation, Route de Nozay, F-91460 Marcoussis, France
More informationTraffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks
Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University
More informationDynamic Wavelength Assignment for WDM All-Optical Tree Networks
Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of
More informationCommunication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1
Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a
More informationSparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms
Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationSplitter Placement in All-Optical WDM Networks
plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National
More informationVirtual Topologies for Multicasting with Multiple Originators in WDM Networks
Virtual Topologies for Multicasting with Multiple Originators in WDM Networks Ian Ferrel Adrian Mettler Edward Miller Ran Libeskind-Hadas Department of Computer Science Harvey Mudd College Claremont, California
More informationWIRELESS broadband networks are being increasingly
1960 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 11, NOVEMBER 2006 Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks Mansoor Alicherry,
More informationDesign of CapEx-Efficient IP-over-WDM Network using Auxiliary Matrix based Heuristic
IEEE ANTS 2014 1570023335 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 60 61 62 63 64
More informationADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS
ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National
More informationInterference Minimization in Topology Control for Ad Hoc Networks
Minimization in Topology Control for Ad Hoc Networks Srinath.K, Venkataramanan.P, Mary Anita Rajam Department of Computer Science and Engineering, College of Engineering, Guindy, Anna University, Chennai,
More informationROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING
ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING Mohamed KOUBAA, Nicolas PUECH, and Maurice GAGNAIRE Telecom Paris - LTCI -
More informationAn Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees
An Algorithm for raffic rooming in WDM Mesh Networks with Dynamically Changing Light-rees Xiaodong Huang, Farid Farahmand, and Jason P. Jue Department of Computer Science Department of Electrical Engineering
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationPower Aware Routing using Power Control in Ad Hoc Networks
Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.
More informationA Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationProlonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN
Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN Fangting Sun, Mark Shayman Department of Electrical and Computer Engineering University of Maryland,
More informationDistributed Clustering Method for Large-Scaled Wavelength Routed Networks
Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima, Hiroaki Harai, Shin ichi Arakawa, and Masayuki Murata Graduate School of Information Science and Technology,
More informationAdaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks
Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &
More informationA FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS
A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,
More informationHeuristic Algorithms for Multiconstrained Quality-of-Service Routing
244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service
More informationArc Perturbation Algorithms for Optical Network Design
Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building
More informationCapacity of Grid-Oriented Wireless Mesh Networks
Capacity of Grid-Oriented Wireless Mesh Networks Nadeem Akhtar and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford, GU2 7H, UK Email: n.akhtar@surrey.ac.uk, k.moessner@surrey.ac.uk
More informationHierarchical Traffic Grooming Formulations
Hierarchical Traffic Grooming Formulations Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206 USA Abstract Hierarchical
More informationOnline Broadcasting and Multicasting in WDM Networks with Shared Light Splitter Bank
1 Online Broadcasting and Multicasting in WDM Networks with Shared Light Splitter Bank Weifa Liang Yuzhen Liu Department of Computer Science Australian National University Canberra, ACT 2, Australia Abstract
More informationVenkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)
Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in
More informationClustering-Based Distributed Precomputation for Quality-of-Service Routing*
Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationIterative Optimization in VTD to Maximize the Open Capacity of WDM Networks
Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks Karcius D.R. Assis, Marcio S. Savasini and Helio Waldman DECOM/FEEC/UNICAMP, CP. 6101, 13083-970 Campinas, SP-BRAZIL Tel: +55-19-37883793,
More informationEfficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme
Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.
More informationDesign of Large-Scale Optical Networks Λ
Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu
More informationTOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,
More informationImplementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point
International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh
More informationAn Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction
Journal of the Korean Institute of Industrial Engineers Vol. 32, No. 3, pp. 219-225, September 2006. An Integer Programming Approach to Packing Lightpaths on WDM Networks Kyungsik Lee 1 Taehan Lee 2 Sungsoo
More informationAN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS
AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,
More informationDYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS
DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043
More informationThe 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.
Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),
More informationDynamic service Allocation with Protection Path
www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path
More informationSurvivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks
Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks Ajay Todimala and Byrav Ramamurthy Department of Computer Science and Engineering University of Nebraska-Lincoln Lincoln
More informationAutomatic Service and Protection Path Computation - A Multiplexing Approach
Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd
More informationOptimal network flow allocation
Optimal network flow allocation EE384Y Project intermediate report Almir Mutapcic and Primoz Skraba Stanford University, Spring 2003-04 May 10, 2004 Contents 1 Introduction 2 2 Background 2 3 Problem statement
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationA Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity
A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for
More informationMax-Flow Protection using Network Coding
Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State
More informationWavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study
598 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study Dhritiman Banerjee
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationKeywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION
Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1
More informationDelay-minimal Transmission for Energy Constrained Wireless Communications
Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu
More informationQoS Topology Control for Nonhomogenous Ad Hoc Wireless Networks
Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 6, Article ID 8417, Pages 1 1 DOI 1.1155/WCN/6/8417 QoS Topology Control for Nonhomogenous Ad Hoc Wireless
More information1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based
1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,
More informationOn minimum m-connected k-dominating set problem in unit disc graphs
J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December
More informationDesigning WDM Optical Networks using Branch-and-Price
Designing WDM Optical Networks using Branch-and-Price S. Raghavan Smith School of Business & Institute for Systems Research University of Maryland College Park, MD 20742 raghavan@umd.edu Daliborka Stanojević
More informationMulti-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks
Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,
More informationA Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks
Tamkang Journal of Science and Engineering, Vol. 14, No. 1, pp. 81 89 (2011) 81 A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks I-Shyan Hwang 1 *, San-Nan
More informationWDM Network Provisioning
IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the
More informationOn Optimal Traffic Grooming in WDM Rings
110 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 On Optimal Traffic Grooming in WDM Rings Rudra Dutta, Student Member, IEEE, and George N. Rouskas, Senior Member, IEEE
More informationAn Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops
An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,
More informationRoute and Spectrum Selection in Dynamic Spectrum Networks
Route and Spectrum Selection in Dynamic Spectrum Networks Qiwei Wang Tsinghua University Beijing, China wangqw04@mails.tsinghua.edu.cn Haitao Zheng Dept. of Computer Science Univ. of California, Santa
More informationDual Power Management for Network Connectivity in Wireless Sensor Networks
Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department
More informationA Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1081 A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects Xiaojun Cao, Student Member, IEEE,
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationComparison of Protection Cost at IP or WDM Layer
Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it
More informationOn Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)
On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information
More informationRECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION
RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION Gökhan Mergen and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 {mergen,ltong}@eecornelledu
More informationEnergy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks
1 Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks Mihaela Cardei, Mohammad O. Pervaiz, and Ionut Cardei Department of Computer Science and Engineering Florida Atlantic University
More informationQoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks
QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University
More informationTopological Design of Multihop Lightwave Networks*
Topological Design of Multihop Lightwave Networks* Cem Ersoy Computer Engineering Department BogaziCi University,Istanbul, Turkey Shivendra S. Panwar Electrical Engineering Department Polytechnic University,
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationAbstract. 1. Introduction
PERFORMANCE MODELING OF HYBRID SATELLITE/WIRELESS NETWORKS USING FIXED POINT APPROXIMATION AND SENSITIVITY ANALYSIS OF THE PERFORMANCE MODELS FOR NETWORK DESIGN Ayan Roy-Chowdhury, Electrical and Computer
More informationRouting for Network Capacity Maximization in Energy-constrained Ad-hoc Networks
Routing for Network Capacity Maximization in Energy-constrained Ad-hoc Networks Koushik Kar Murali Kodialam T. V. Lakshman Leandros Tassiulas ECSE Department Bell Labs ECE Department Rensselaer Polytechnic
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationQuantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET)
Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET) 1 Syed S. Rizvi, 2 Aasia Riasat, and 3 Khaled M. Elleithy 1, 3 Computer Science and Engineering Department, University
More informationCost-Effective Traffic Grooming in WDM Rings
618 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Cost-Effective Traffic Grooming in WDM Rings Ornan Gerstel, Member, IEEE, Rajiv Ramaswami, Fellow, IEEE, and Galen H. Sasaki, Member,
More informationMaximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution
Arindam K. Das, Mohamed El-Sharkawi, Robert J. Marks, Payman Arabshahi and Andrew Gray, "Maximization of Time-to-First-Failure for Multicasting in Wireless Networks : Optimal Solution", Military Communications
More information